Tag
#microsoft
By Jon Munshaw. Welcome to this week’s edition of the Threat Source newsletter. Many of you readers may be gearing up for a West Coast swing over the next few weeks through San Francisco and Las Vegas for RSA and Cisco Live, respectively. And we’re right behind you! Talos... [[ This is only the beginning! Please visit the blog for the complete entry ]]
An access control issue in ICT Protege GX/WX 2.08 allows attackers to leak SHA1 password hashes of other users.
In Afian Filerun 20220202 Changing the "search_tika_path" variable to a custom (and previously uploaded) jar file results in remote code execution in the context of the webserver user.
Although organizations should perform proper risk analysis and patch as soon as practical after there's a fix for this vulnerability, defenders still have options before that's released.
Artificial intelligence technology can detect the latest wave of Trickbot ransomware and block the attack before it causes damage.
Speaking at WithSecure’s annual conference, Mikko Hyppönen discussed the threat landscape between the two nations
The cloud instances were left open to the public Internet with no authentication, allowing attackers to wipe the data.
Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability.
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-30127.
Microsoft Edge (Chromium-based) Spoofing Vulnerability.